Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-10145

Опубликовано: 03 июн. 2019
Источник: debian
EPSS Низкий

Описание

rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` do not have seccomp filtering during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rktremovedpackage

Примечания

  • https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/

  • https://github.com/rkt/rkt/issues/3998

EPSS

Процентиль: 11%
0.00037
Низкий

Связанные уязвимости

CVSS3: 7.7
ubuntu
больше 6 лет назад

rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` do not have seccomp filtering during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.

CVSS3: 7.7
nvd
больше 6 лет назад

rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` do not have seccomp filtering during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.

CVSS3: 7.7
github
больше 3 лет назад

rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` do not have seccomp filtering during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.

EPSS

Процентиль: 11%
0.00037
Низкий